Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Download

📚 The CoCalc Library - books, templates and other resources

132939 views
License: OTHER
1
% This file was created with JabRef 2.10.
2
% Encoding: Cp1252
3
4
5
@String { apr = {April} }
6
@String { aug = {August} }
7
@String { dec = {Dezember} }
8
@String { feb = {Februar} }
9
@String { jan = {Januar} }
10
@String { jul = {Juli} }
11
@String { jun = {Juni} }
12
@String { mar = {M{\"a}rz} }
13
@String { may = {Mai} }
14
@String { nov = {November} }
15
@String { oct = {Oktober} }
16
@String { sep = {September} }
17
18
@Misc{Albert2012,
19
Title = {Understanding C by learning assembly},
20
21
Author = {David Albert},
22
Month = sep,
23
Year = {2012},
24
25
Comment = {Verf{\"u}gbar unter \url{https://www.recurse.com/blog/7-understanding-c-by-learning-assembly}},
26
Owner = {Martin Thoma},
27
Timestamp = {2015.09.02},
28
Url = {https://www.recurse.com/blog/7-understanding-c-by-learning-assembly}
29
}
30
31
@Misc{Arora2013,
32
Title = {Buffer Overflow Attack Explained with a {C} Program Example},
33
34
Author = {Himanshu Arora},
35
Month = jun,
36
Year = {2013},
37
38
Owner = {Martin Thoma},
39
Timestamp = {2015.09.02},
40
Url = {http://www.thegeekstuff.com/2013/06/buffer-overflow/}
41
}
42
43
@Misc{Bendersky2011,
44
Title = {Stack frame layout on x86-64},
45
46
Author = {Eli Bendersky},
47
Month = sep,
48
Year = {2011},
49
50
Owner = {Martin Thoma},
51
Timestamp = {2015.09.02},
52
Url = {http://eli.thegreenplace.net/2011/09/06/stack-frame-layout-on-x86-64/}
53
}
54
55
@Misc{Bray2002,
56
Title = {Compiler Security Checks In Depth},
57
58
Author = {Brandon Bray},
59
HowPublished = {MSDN},
60
Month = feb,
61
Year = {2002},
62
63
Owner = {Martin Thoma},
64
Timestamp = {2015.06.29},
65
Url = {https://msdn.microsoft.com/en-us/library/aa290051(v=vs.71).aspx}
66
}
67
68
@InProceedings{Checkoway2011,
69
Title = {Comprehensive Experimental Analyses of Automotive Attack Surfaces},
70
Author = {Checkoway, Stephen and McCoy, Damon and Kantor, Brian and Anderson, Danny and Shacham, Hovav and Savage, Stefan and Koscher, Karl and Czeskis, Alexei and Roesner, Franziska and Kohno, Tadayoshi},
71
Booktitle = {Proceedings of the 20th USENIX Conference on Security},
72
Year = {2011},
73
74
Address = {Berkeley, CA, USA},
75
Pages = {6--6},
76
Publisher = {USENIX Association},
77
Series = {SEC'11},
78
79
Abstract = {Modern automobiles are pervasively computerized, and hence potentially vulnerable to attack. However, while previous research has shown that the internal networks within some modern cars are insecure, the associated threat model--requiring prior physical access--has justifiably been viewed as unrealistic. Thus, it remains an open question if automobiles can also be susceptible to remote compromise. Our work seeks to put this question to rest by systematically analyzing the external attack surface of a modern automobile. We discover that remote exploitation is feasible via a broad range of attack vectors (including mechanics tools, CD players, Bluetooth and cellular radio), and further, that wireless communications channels allow long distance vehicle control, location tracking, in-cabin audio exfiltration and theft. Finally, we discuss the structural characteristics of the automotive ecosystem that give rise to such problems and highlight the practical challenges in mitigating them.},
80
Acmid = {2028073},
81
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/cars-usenixsec2011.pdf:PDF},
82
Location = {San Francisco, CA},
83
Numpages = {1},
84
Owner = {Martin Thoma},
85
Timestamp = {2015.04.24},
86
Url = {http://dl.acm.org/citation.cfm?id=2028067.2028073}
87
}
88
89
@Misc{Sky2014,
90
Title = {Thousands Of Cars Stolen Using Hi-Tech Gadgets},
91
92
Author = {Thomas Cheshire},
93
Month = may,
94
Year = {2014},
95
96
Abstract = {A Sky News investigation finds that almost half the 89,000 vehicles broken into in London last year were hacked electronically.},
97
Owner = {Martin Thoma},
98
Timestamp = {2015.06.15},
99
Url = {http://news.sky.com/story/1257320/thousands-of-cars-stolen-using-hi-tech-gadgets}
100
}
101
102
@Book{Eckert2012,
103
Title = {IT-Sicherheit},
104
Author = {Claudia Eckert},
105
Publisher = {Oldenbourd Wissenschaftsverlag GmbH},
106
Year = {2012},
107
108
Owner = {Martin Thoma},
109
Timestamp = {2015.06.29}
110
}
111
112
@Misc{Richtlinie70/156/EWG:Fahrzeugklassen,
113
Title = {Richtlinie des {Rates} 70/156/EWG},
114
115
Author = {{Europ\"{a}ischer Rat}},
116
Month = feb,
117
Year = {1970},
118
119
Owner = {Martin Thoma},
120
Timestamp = {2015.06.11},
121
Url = {http://eur-lex.europa.eu/legal-content/DE/TXT/?qid=1434048145188&uri=CELEX:31970L0156}
122
}
123
124
@Misc{EURegulation2015/ecall,
125
Title = {Verordnung ({EU}) 2015/758 des Europ\"{a}ischen {Parlaments} und des {Rates}},
126
127
Author = {{European Parliament, Council of the European Union}},
128
Month = apr,
129
Year = {2015},
130
131
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/EU-Verordnung-2015-758-ecall.pdf:PDF},
132
Owner = {Martin Thoma},
133
Timestamp = {2015.06.01},
134
Url = {http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32015R0758}
135
}
136
137
@Misc{EURegulation661/2009,
138
Title = {Verordnung ({EG}) Nr. 661/2009 des Europ\"{a}ischen {Parlaments} und des {Rates}},
139
140
Author = {{European Parliament, Council of the European Union}},
141
Month = jul,
142
Year = {2009},
143
144
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/EU-Verordnung-661-2009.pdf:PDF},
145
Owner = {Martin Thoma},
146
Timestamp = {2015.06.01},
147
Url = {http://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32009R0661}
148
}
149
150
@Misc{EUDirective98/69/EC,
151
Title = {Richtlinie {98/69/EC} des Europ\"{a}ischen {Parlaments} und des {Rates}},
152
153
Author = {{European Parliament, Council of the European Union}},
154
Month = oct,
155
Note = {\newline\url{http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31998L0069}},
156
Year = {1998},
157
158
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/EU-Richtlinie-98-69-EG.pdf:PDF},
159
Owner = {Martin Thoma},
160
Timestamp = {2015.06.01},
161
Url = {http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31998L0069}
162
}
163
164
@InProceedings{Foster2015,
165
Title = {Fast and Vulnerable: A Story of Telematic Failures},
166
Author = {Ian Foster and Andrew Prudhomme and Karl Koscher and Stefan Savage},
167
Booktitle = {9th USENIX Workshop on Offensive Technologies (WOOT 15)},
168
Year = {2015},
169
170
Address = {Washington, D.C.},
171
Month = aug,
172
Publisher = {USENIX Association},
173
174
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/woot15-paper-foster.pdf:PDF},
175
Url = {https://www.usenix.org/system/files/conference/woot15/woot15-paper-foster.pdf}
176
}
177
178
@InProceedings{Francillon2011,
179
Title = {Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars},
180
Author = {Aurelien Francillon AND Boris Danev AND Srdjan Capkun},
181
Booktitle = {NDSS},
182
Year = {2011},
183
184
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/relay-attacks-on-passive-keyless-entry-and-start-systems-in-modern-cars.pdf:PDF},
185
Owner = {Martin Thoma},
186
Review = {* immobilizer chips prevent key copying
187
* legal implications (no trace of theft / closing/opening the door)
188
* open car to access OBD-II port for further attacks},
189
Timestamp = {2015.05.15},
190
Url = {https://eprint.iacr.org/2010/332.pdf}
191
}
192
193
@Misc{Gallagher2015,
194
Title = {Fiat Chrysler recalls 1.4 million cars over remote hack vulnerability},
195
196
Author = {Sean Gallagher},
197
HowPublished = {arstechnica},
198
Month = jul,
199
Year = {2015},
200
201
Owner = {Martin Thoma},
202
Timestamp = {2015.09.03},
203
Url = {http://arstechnica.com/security/2015/07/fiat-chrysler-recalls-1-4-million-cars-over-remote-hack-vulnerability/}
204
}
205
206
@Misc{Greenberg2015,
207
Title = {Your {BMW} or {Benz} Could Also Be Vulnerable to That {GM} {OnStar} Hack},
208
209
Author = {Andy Greenberg},
210
Month = aug,
211
Year = {2015},
212
213
Owner = {Martin Thoma},
214
Timestamp = {2015.09.03},
215
Url = {http://www.wired.com/2015/08/bmw-benz-also-vulnerable-gm-onstar-hack/}
216
}
217
218
@Misc{Dailymail2015,
219
Title = {Car-hackers driving off with top motors: Increasing numbers being stolen after thieves simply bypass security devices},
220
221
Author = {Chris Greenwood},
222
Month = feb,
223
Year = {2015},
224
225
Abstract = {Gangs using �keyless techniques are estimated to have stolen more than 6,000 vehicles in London alone last year almost half of all cars and vans stolen.
226
227
...
228
229
230
[...] Experts are concerned that thieves may even be using computer malware to take over vehicle systems via satellite, issuing remote commands for them to unlock and start up.[...]},
231
Owner = {Martin Thoma},
232
Timestamp = {2015.06.15},
233
Url = {http://www.dailymail.co.uk/news/article-2938793/Car-hackers-driving-motors-Increasing-numbers-stolen-thieves-simply-bypass-security-devices.html}
234
}
235
236
@Article{Howard2006,
237
Title = {A process for performing security code reviews},
238
Author = {Howard, M.A.},
239
Journal = {Security Privacy, IEEE},
240
Year = {2006},
241
242
Month = jul,
243
Number = {4},
244
Pages = {74-79},
245
Volume = {4},
246
247
__markedentry = {[Martin Thoma:]},
248
Abstract = {No one really likes reviewing source code for security vulnerabilities; its slow, tedious, and mind-numbingly boring. Yet, code review is a critical component of shipping secure software to customers. Neglecting it isn't an option},
249
Doi = {10.1109/MSP.2006.84},
250
File = {:home/moose/GitHub/informatik-2011/Paper/sicherheit-kog-autos/a-process-for-performing-security-code-reviews.pdf:PDF},
251
ISSN = {1540-7993},
252
Keywords = {program debugging;program diagnostics;security of data;security code reviews;security vulnerabilities;Computer bugs;Computer security;Data analysis;Data security;History;Java;Performance analysis;Privacy;Software tools;Wildlife;code review;secure code;security vulnerabilities},
253
Owner = {Martin Thoma},
254
Timestamp = {2015.06.29}
255
}
256
257
@Patent{Hwang1997,
258
Title = {Wireless car security system},
259
Nationality = {United States},
260
Year = {1997},
261
Author = {Hwang, S.M.},
262
Month = jul,
263
Note = {US Patent 5,648,754},
264
Url = {https://www.google.com/patents/US5648754},
265
266
Owner = {Martin Thoma},
267
Publisher = {Google Patents},
268
Timestamp = {2015.06.19}
269
}
270
271
@Misc{SAE2004,
272
Title = {Recommended Practice for Pass-Thru Vehicle Programming},
273
274
Author = {SAE International},
275
Month = dec,
276
Year = {2004},
277
278
Institution = {Vehicle E E System Diagnostic Standards Committee},
279
Organization = {SAE International},
280
Owner = {Martin Thoma},
281
Timestamp = {2015.06.29},
282
Url = {http://standards.sae.org/j2534/1_200412/}
283
}
284
285
@Misc{Jones2015,
286
Title = {{BMW} Fixes Software Flaw That Would�ve Let Hackers Unlock Doors},
287
288
Author = {Willie Jones},
289
Month = feb,
290
Year = {2015},
291
292
Owner = {Martin Thoma},
293
Timestamp = {2015.06.19},
294
Url = {http://spectrum.ieee.org/cars-that-think/transportation/systems/bmw-fixes-vehicle-software-flaw-that-wouldve-let-hackers-in}
295
}
296
297
@Book{Metasploit2012,
298
Title = {Metasploit},
299
Author = {David Kennedy},
300
Publisher = {mitp Professional},
301
Year = {2012},
302
303
Owner = {Martin Thoma},
304
Timestamp = {2015.06.04}
305
}
306
307
@TechReport{Kiencke1986,
308
Title = {Automotive Serial Controller Area Network},
309
Author = {Uwe Kiencke AND Siegfried Dais AND Martin Litschel},
310
Institution = {Robert Bosch GmbH},
311
Year = {1986},
312
Month = feb,
313
314
Abstract = {A high speed serial communication link has been developed for interconnecting electronic control units within automobiles. The incorporation of object oriented communication in conjunction with acceptance filtering introduces a new level of message handling efficiency and flexibility. Powerful error handling techniques guarantee safe operation in noisy automotive environments.},
315
Doi = {10.4271/860391},
316
Owner = {Martin Thoma},
317
Timestamp = {2015.06.01},
318
Url = {http://papers.sae.org/860391/}
319
}
320
321
@InProceedings{Koscher2010,
322
Title = {Experimental Security Analysis of a Modern Automobile},
323
Author = {Koscher, Karl and Czeskis, Alexei and Roesner, Franziska and Patel, Shwetak and Kohno, Tadayoshi and Checkoway, Stephen and McCoy, Damon and Kantor, Brian and Anderson, Danny and Shacham, Hovav and Savage, Stefan},
324
Booktitle = {Proceedings of the 2010 IEEE Symposium on Security and Privacy},
325
Year = {2010},
326
327
Address = {Washington, DC, USA},
328
Pages = {447--462},
329
Publisher = {IEEE Computer Society},
330
Series = {SP '10},
331
332
Acmid = {1849990},
333
Doi = {10.1109/SP.2010.34},
334
File = {:/home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/cars-oakland2010.pdf:PDF},
335
ISBN = {978-0-7695-4035-1},
336
Keywords = {Automobiles, communication standards, communication system security, computer security, data buses},
337
Numpages = {16},
338
Owner = {Martin Thoma},
339
Timestamp = {2015.04.24},
340
Url = {http://dx.doi.org/10.1109/SP.2010.34}
341
}
342
343
@Misc{Lee2014,
344
Title = {Keyless cars 'increasingly targeted by thieves using computers'},
345
346
Author = {Dave Lee},
347
Month = oct,
348
Year = {2014},
349
350
Owner = {Martin Thoma},
351
Timestamp = {2015.06.15},
352
Url = {http://www.bbc.com/news/technology-29786320}
353
}
354
355
@Article{Leen2002,
356
Title = {Expanding automotive electronic systems},
357
Author = {Leen, G. and Heffernan, D.},
358
Journal = {Computer},
359
Year = {2002},
360
361
Month = jan,
362
Number = {1},
363
Pages = {88-93},
364
Volume = {35},
365
366
Abstract = {A vast increase in automotive electronic systems, coupled with related demands on power and design, has created an array of new engineering opportunities and challenges. Today's high-end vehicles may have more than 4 kilometers of wiring, compared to 45 meters in vehicles manufactured in 1955. Reducing wiring mass through in-vehicle networks will bring an explosion of new functionality and innovation. Our vehicles will become more like PCs, creating the potential for a host of plug-and-play devices. On average, US commuters spend 9 percent of their day in an automobile. Thus, introducing multimedia and telematics to vehicles will increase productivity and provide entertainment for millions. Further, X-by-wire solutions will make computer diagnostics a standard part of mechanics' work and may even create an electronic chauffeur},
367
Doi = {10.1109/2.976923},
368
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/Expanding-Automotive-Electronic-Systems.pdf:PDF},
369
ISSN = {0018-9162},
370
Keywords = {automobiles;automotive electronics;controller area networks;entertainment;multimedia systems;traffic engineering computing;PCs;US commuters;X-by-wire solutions;automobile;automotive electronic systems;computer diagnostics;electronic chauffeur;engineering opportunities;entertainment;high-end vehicles;in-vehicle networks;multimedia;plug-and-play devices;productivity;telematics;wiring mass;Automobile manufacture;Automotive electronics;Automotive engineering;Design engineering;Explosions;Personal communication networks;Power engineering and energy;Technological innovation;Vehicles;Wiring},
371
Owner = {Martin Thoma},
372
Timestamp = {2015.06.19},
373
Url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=976923}
374
}
375
376
@InProceedings{Li2008,
377
Title = {A design for automotive CAN bus monitoring system},
378
Author = {Renjun Li and Chu Liu and Feng Luo},
379
Booktitle = {Vehicle Power and Propulsion Conference, 2008. VPPC '08. IEEE},
380
Year = {2008},
381
Month = sep,
382
Pages = {1-5},
383
384
Abstract = {This system is designed to test automotive CAN (controller area network) controlled devices or entire network. This system not only can display CAN frames (CAN 2.0A/B) received from or sent onto CAN bus, but also can record data on log files for off-line evaluation. Users can configure several monitoring modes and CAN channel features of the system with PC application. Furthermore the USB technology adopted in the system make it a more practical and convenient CAN bus testing system.},
385
Doi = {10.1109/VPPC.2008.4677544},
386
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/04677544.pdf:PDF},
387
Keywords = {automotive electronics;controller area networks;field buses;protocols;CAN bus testing system;PC application;USB technology;automotive CAN bus monitoring system;controller area network;off-line evaluation;serial bus communication protocol;Automotive engineering;Control systems;Educational institutions;Filters;Monitoring;Propulsion;Smart cards;Space vehicles;System testing;Universal Serial Bus;CAN Bus;Monitoring System;USB},
388
Owner = {Martin Thoma},
389
Timestamp = {2015.06.01}
390
}
391
392
@Misc{Mahaffey2015,
393
Title = {Hacking a {Tesla} Model S: What we found and what we learned},
394
395
Author = {Kevin Mahaffey},
396
Month = aug,
397
Year = {2015},
398
399
Owner = {Martin Thoma},
400
Timestamp = {2015.09.03},
401
Url = {https://blog.lookout.com/blog/2015/08/07/hacking-a-tesla/}
402
}
403
404
@Article{McGraw2008,
405
Title = {Automated Code Review Tools for Security},
406
Author = {McGraw, G.},
407
Journal = {Computer},
408
Year = {2008},
409
410
Month = dec,
411
Number = {12},
412
Pages = {108-111},
413
Volume = {41},
414
415
__markedentry = {[Martin Thoma:6]},
416
Abstract = {Computer security has experienced important fundamental changes over the past decade. The most promising developments in security involve arming software developers and architects with the knowledge and tools they need to build more secure software. Among the many security tools available to software practitioners, static analysis tools for automated code review are the most effective. The paper presents how they work and why all developers should use them.},
417
Doi = {10.1109/MC.2008.514},
418
File = {:home/moose/GitHub/informatik-2011/Paper/sicherheit-kog-autos/automated-code-review-tools-for-security.pdf:PDF},
419
ISSN = {0018-9162},
420
Keywords = {program diagnostics;security of data;automated code review tools;computer security;secure software;software architects;software developers;static analysis tools;Application software;Best practices;Computer hacking;Computer security;IP networks;Instruments;Local area networks;Programming profession;Risk analysis;Software tools;code review;how things work;software development;software security;static analysis tools},
421
Language = German,
422
Owner = {Martin Thoma},
423
Timestamp = {2015.06.29}
424
}
425
426
@Misc{Mixter,
427
Title = {Writing buffer overflow exploits - a tutorial for beginners},
428
429
Author = {Mixter},
430
431
Url = {http://www.eecis.udel.edu/~bmiller/cis459/2007s/readings/buff-overflow.html}
432
}
433
434
@Misc{Nol2012,
435
Title = {Car thieves can steal motors in just 10 seconds - six times faster than a decade ago (and black Audis are their favourite)},
436
437
Author = {Steve Nolan},
438
Month = oct,
439
Year = {2012},
440
441
Abstract = {And Black Audis are top of car thieves shopping lists with 150,000 cars are stolen each year and two thirds of these taken with their keys.
442
...},
443
Owner = {Martin Thoma},
444
Timestamp = {2015.06.15},
445
Url = {http://www.dailymail.co.uk/news/article-2223414/Car-thieves-steal-motors-just-10-seconds--times-faster-decade-ago-black-Audis-favourite.html}
446
}
447
448
@InProceedings{Obermaisser2008,
449
Title = {Temporal and Spatial Partitioning of a Time-Triggered Operating System Based on Real-Time Linux},
450
Author = {Obermaisser, R. and Leiner, B.},
451
Booktitle = {Object Oriented Real-Time Distributed Computing (ISORC), 2008 11th IEEE International Symposium on},
452
Year = {2008},
453
Month = may,
454
Pages = {429-435},
455
456
Abstract = {Real-time Linux variants are becoming prominent solutions for the development of embedded systems. Compared to traditional real-time operating systems, embedded system engineers can leverage solutions and knowhow from the Linux development community (e.g., development tools, applications, drivers). Due to the availability of implementations of Internet protocols and network drivers, Linux also facilitates the implementation of embedded systems connected to the Internet. The goal of this paper is to evaluate experimentally the capabilities of the Real-time Linux variant RTAI/LXRT with respect to partitioning between different application software modules. Partitioning ensures that a failure caused by a design fault in one application software module cannot propagate to cause a failure in other application software modules, e.g., by blocking access to the CPU or by overwriting memory. Partitioning is important when building mixed-criticality systems comprising both non safety-critical software modules and safety-related ones. Even at the same level of criticality, partitioning improves the robustness of an embedded system. The experimental results described in this paper point out several limitations of RTAI/LXRT Linux concerning fault isolation. Based on these results, we propose modifications to improve the partitioning with respect to temporal and spatial interference.},
457
Doi = {10.1109/ISORC.2008.10},
458
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/temporal-and-spatial-partitioning-of-a-time-triggered-operating-system-based-on-real-time-linux.pdf:PDF},
459
Keywords = {Linux;operating systems (computers);safety-critical software;real-time Linux;real-time abstraction interface;safety-critical software module;spatial partitioning;temporal partitioning;time-triggered operating system;Application software;Buildings;Embedded system;IP networks;Linux;Operating systems;Protocols;Real time systems;Software safety;Systems engineering and theory;fault-tolerance;operating systems;partitioning;real-time systems},
460
Owner = {Martin Thoma},
461
Timestamp = {2015.06.19}
462
}
463
464
@Misc{Poulsen2010,
465
Title = {Hacker Disables More Than 100 Cars Remotely},
466
467
Author = {Kevin Poulsen},
468
Month = mar,
469
Year = {2010},
470
471
Owner = {Martin Thoma},
472
Timestamp = {2015.09.03},
473
Url = {http://www.wired.com/2010/03/hacker-bricks-cars/}
474
}
475
476
@Misc{Rojas2014,
477
Title = {Der Hacker als Chauffeur},
478
479
Author = {Ra�l Rojas},
480
Month = dec,
481
Year = {2014},
482
483
Abstract = {(Wolfgang Wiewesiek, "Secure Hardware Extension", Workshop on Cryptography and Embedded Security, N�rnberg, 2012},
484
Owner = {Martin Thoma},
485
Timestamp = {2015.06.15},
486
Url = {http://www.heise.de/tp/artikel/43/43544/1.html}
487
}
488
489
@InProceedings{Rouf2010,
490
Title = {Security and Privacy Vulnerabilities of In-car Wireless Networks: A Tire Pressure Monitoring System Case Study},
491
Author = {Rouf, Ishtiaq AND Miller, Rob AND Mustafa, Hossen AND Taylor, Travis AND Oh, Sangho AND Xu, Wenyuan AND Gruteser, Marco AND Trappe, Wade AND Seskar, Ivan},
492
Booktitle = {Proceedings of the 19th USENIX Conference on Security},
493
Year = {2010},
494
495
Address = {Berkeley, CA, USA},
496
Pages = {21--21},
497
Publisher = {USENIX Association},
498
Series = {USENIX Security'10},
499
500
Acmid = {1929848},
501
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/security-and-privacy-vulnerabilities-of-in-car-wireless-networks-a-tire-pressure-monitoring-system-case-study2010-002-tpms.pdf:PDF},
502
ISBN = {888-7-6666-5555-4},
503
Location = {Washington, DC},
504
Numpages = {1},
505
Owner = {Martin Thoma},
506
Review = {* eavesdropping is easily possible at a distance of roughly 40m from a passing vehicle
507
* Further, current protocols do not employ authentication and vehicle implementations do not perform basic input validation, thereby allowing for remote spoofing of sensor messages.
508
* The wide deployment of TPMSs in the United States is an outgrowth of the TREAD Act [35] resulting from the Ford-Firestone tire failure controversy [17].
509
* [...] These benefits have recently led to similar legislation in the European Union [7] which mandates TPMSs on all new vehicles starting in 2012.
510
* Spoofing (low pressure warning!) / Jamming / Reading / Vehicle identificaion is possible
511
* Temporary IDs could be used},
512
Timestamp = {2015.05.15},
513
Url = {http://dl.acm.org/citation.cfm?id=1929820.1929848}
514
}
515
516
@Book{Sambleben2012,
517
Title = {Informationstechnologie und Sicherheitspolitik: Wird der dritte Weltkrieg im Internet ausgetragen?},
518
Author = {Sambleben, J. AND Schumacher, S.},
519
Publisher = {Books on Demand},
520
Year = {2012},
521
522
ISBN = {9783848232703},
523
Owner = {Martin Thoma},
524
Timestamp = {2015.06.04},
525
Url = {https://books.google.de/books?id=ZFOR4lELZ40C}
526
}
527
528
@Book{ServerSecurity2008,
529
Title = {Guide to general server security},
530
Author = {Karen Scarfone AND Wayne Jansen AND Miles Tracy},
531
Publisher = {U.S. Dept. of Commerce, National Institute of Standards and Technology},
532
Year = {2008},
533
534
Owner = {Martin Thoma},
535
Timestamp = {2015.06.11},
536
Url = {http://csrc.nist.gov/publications/nistpubs/800-123/SP800-123.pdf}
537
}
538
539
@Patent{Seibold1988,
540
Title = {Security system and method for electronic apparatus, particularly car radios or similar automotive audio equipment},
541
Nationality = {United States},
542
Number = {US4720700 A},
543
Year = {1988},
544
Yearfiled = {1986},
545
Author = {Seibold, P. and Strauss, K.P.},
546
Month = jan # {~19},
547
Note = {US Patent 4,720,700},
548
Url = {https://www.google.com/patents/US4720700},
549
550
Owner = {Martin Thoma},
551
Publisher = {Google Patents},
552
Timestamp = {2015.06.19}
553
}
554
555
@Misc{Seltzer2013,
556
Title = {The {Morris} Worm: Internet malware turns 25},
557
558
Author = {Larry Seltzer},
559
Month = nov,
560
Year = {2013},
561
562
Owner = {Martin Thoma},
563
Timestamp = {2015.09.04},
564
Url = {http://www.zdnet.com/article/the-morris-worm-internet-malware-turns-25/}
565
}
566
567
@Book{Silberschatz2005,
568
Title = {Operating System Concepts},
569
Author = {Abraham Silberschatz AND Peter Baer Galvin AND Greg Gagne},
570
Editor = {7},
571
Publisher = {John Wiley \& Sons. Inc},
572
Year = {2005},
573
574
Owner = {Martin Thoma},
575
Timestamp = {2015.09.05}
576
}
577
578
@InProceedings{Song2008,
579
Title = {SVATS: A Sensor-Network-Based Vehicle Anti-Theft System},
580
Author = {Hui Song and Sencun Zhu and Guohong Cao},
581
Booktitle = {INFOCOM 2008. The 27th Conference on Computer Communications. IEEE},
582
Year = {2008},
583
Month = apr,
584
Pages = {-},
585
586
Abstract = {Today vehicle theft rate is very high, thus tracking/alarming systems are being deployed with an increasingly popularity. These systems however bear some limitations such as high cost, high false-alarm rate, and easy to be disabled. This paper describes the design, implementation and evaluation of a Sensor-network-based Vehicle Anti-Theft System (SVATS) to address these limitations. In this system, the sensors in the vehicles that are parked within the same parking area first form a sensor network, then monitor and identify possible vehicle thefts by detecting unauthorized vehicle movement. When an unauthorized movement is detected, an alert will be reported to a base station in the parking area, which sends warning messages to the security office. This paper focuses on the technical issues specific to the system such as topology management, theft detection, and intra-vehicle networking.},
587
Doi = {10.1109/INFOCOM.2008.279},
588
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/svats-a-sensor-network-based-vehicle-anti-theft-system.pdf:PDF},
589
ISSN = {0743-166X},
590
Keywords = {alarm systems;road vehicles;traffic engineering computing;wireless sensor networks;alarming system;base station;false-alarm rate;intra-vehicle networking;sensor-network-based vehicle anti-theft system;topology management;tracking system;unauthorized vehicle movement detection;vehicle theft rate;Alarm systems;Base stations;Broadcasting;Communications Society;Computer science;Costs;Global Positioning System;Monitoring;Sensor systems;Vehicle detection},
591
Owner = {Martin Thoma},
592
Timestamp = {2015.06.19}
593
}
594
595
@Misc{Spaar2015,
596
Title = {{Auto, \"offne dich! Sicherheitsl\"ucken bei {BMWs} ConnectedDrive}},
597
598
Author = {Dieter Spaar},
599
Year = {2015},
600
601
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/ct-bmw-hack.pdf:PDF},
602
Journal = {c't},
603
Owner = {Martin Thoma},
604
Timestamp = {2015.05.15},
605
Url = {http://www.heise.de/newsticker/meldung/ConnectedDrive-Der-BMW-Hack-im-Detail-2540786.html}
606
}
607
608
@Misc{Stevens2015,
609
Title = {{GM} issues fix for {OnStar} hack},
610
611
Author = {Tim Stevens},
612
Month = jul,
613
Year = {2015},
614
615
Owner = {Martin Thoma},
616
Timestamp = {2015.09.03},
617
Url = {http://www.cnet.com/news/ownstar-onstar-hack/}
618
}
619
620
@TechReport{Stumpf2013,
621
Title = {CycurHSM - An Automotive-qualified Software Stack for Hardware Security Modules},
622
Author = {Frederic Stumpf},
623
Institution = {escrypt GmbH},
624
Year = {2013},
625
626
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/CycurHSM-Whitepaper.pdf:PDF},
627
Owner = {Martin Thoma},
628
Timestamp = {2015.05.15},
629
Url = {https://www.escrypt.com/fileadmin/escrypt/pdf/CycurHSM-Whitepaper.pdf}
630
}
631
632
@InProceedings{Syverson1994,
633
Title = {A taxonomy of replay attacks [cryptographic protocols]},
634
Author = {Syverson, P.},
635
Booktitle = {Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings},
636
Year = {1994},
637
Month = jun,
638
Pages = {187-191},
639
640
Abstract = {This paper presents a taxonomy of replay attacks on cryptographic protocols in terms of message origin and destination. The taxonomy is independent of any method used to analyze or prevent such attacks. It is also complete in the sense that any replay attack is composed entirely of elements classified by the taxonomy. The classification of attacks is illustrated using both new and previously known attacks on protocols. The taxonomy is also used to discuss the appropriateness of particular countermeasures and protocol analysis methods to particular kinds of replays},
641
Doi = {10.1109/CSFW.1994.315935},
642
ISSN = {1063-6900},
643
Keywords = {cryptography;protocols;cryptographic protocols;message origin;replay attacks;taxonomy;Authorization;Cryptographic protocols;Cryptography;Laboratories;Security;Taxonomy}
644
}
645
646
@Patent{Turner1999,
647
Title = {Automotive vehicle anti-theft and anti-vandalism and anti-carjacking system},
648
Nationality = {United States},
649
Number = {US6002326 A},
650
Year = {1999},
651
Yearfiled = {1997},
652
Author = {Turner, V.J.},
653
Month = dec # {~14},
654
Note = {US Patent 6,002,326},
655
Url = {https://www.google.com/patents/US6002326},
656
657
Owner = {Martin Thoma},
658
Publisher = {Google Patents},
659
Timestamp = {2015.06.19}
660
}
661
662
@InProceedings{Verdult2015,
663
Title = {Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer},
664
Author = {Roel Verdult and Flavio D. Garcia and Baris Ege},
665
Booktitle = {Supplement to the 22nd USENIX Security Symposium (USENIX Security 13)},
666
Year = {2015},
667
668
Address = {Washington, D.C.},
669
Pages = {703--718},
670
Publisher = {USENIX Association},
671
672
ISBN = {978-1-931971-232},
673
Url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/verdult}
674
}
675
676
@Article{Wolf2004,
677
Title = {Sicherheit in automobilen Bussystemen},
678
Author = {Marko Wolf AND Andr{\'e} Weimerskirch AND Christof Paar},
679
Journal = {Automotive - Safety \& Security},
680
Year = {2004},
681
682
Month = oct,
683
684
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/WolfEtAl_SicherheitAutomobileBussysteme.pdf:PDF},
685
Owner = {Martin Thoma},
686
Timestamp = {2015.06.15},
687
Url = {http://www.weimerskirch.org/papers/WolfEtAl_SicherheitAutomobileBussysteme.pdf}
688
}
689
690
@Misc{Dailymail2014,
691
Title = {Forget carjacking, the next big threat is car-HACKING: Thousands of vehicles are being stolen using cheap gadgets bought online},
692
693
Author = {Victoria Woollaston},
694
Month = may,
695
Year = {2014},
696
697
Abstract = {... According to the MPS, 21,000 cars were stolen last year, and a further 68,000 were broken into. ...},
698
Owner = {Martin Thoma},
699
Timestamp = {2015.06.15},
700
Url = {http://www.dailymail.co.uk/sciencetech/article-2623275/Forget-carjacking-big-threat-car-HACKING-Thousands-vehicles-stolen-using-cheap-gadgets-bought-online.html}
701
}
702
703
@Article{Wright2011,
704
Title = {Hacking Cars},
705
Author = {Wright, Alex},
706
Journal = {Commun. ACM},
707
Year = {2011},
708
709
Month = nov,
710
Number = {11},
711
Pages = {18--19},
712
Volume = {54},
713
714
Acmid = {2018403},
715
Address = {New York, NY, USA},
716
Doi = {10.1145/2018396.2018403},
717
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/hacking-cars-p18-wright.pdf:PDF},
718
ISSN = {0001-0782},
719
Issue_date = {November 2011},
720
Numpages = {2},
721
Owner = {Martin Thoma},
722
Publisher = {ACM},
723
Review = {"Ever since Toyota's well-publicized
724
struggles with the computerized brak-
725
ing systems in its 2010 Prius hybrid
726
cars, automotive computer systems
727
have come under increasing scrutiny."
728
729
See http://edition.cnn.com/2010/WORLD/asiapcf/02/04/japan.prius.complaints/ - Probleme mit ABS / delay of break
730
731
"At the University of South Carolina,
732
assistant professor Wenyuan Xu dis-
733
covered that she could track the move-
734
ment of cars by tapping into the RFID
735
data stored in modern tire pressure
736
monitoring systems from up to a dis-
737
tance of 40 meters."
738
739
Kevin
740
Finisterre of security consultancy Dig-
741
ital Munition - police cars
742
743
Embedded Vehicle Safety Committee},
744
Timestamp = {2015.05.15},
745
Url = {http://doi.acm.org/10.1145/2018396.2018403}
746
}
747
748
@Misc{AirbiquityFord,
749
Title = {Airbiquity link highlights {Ford}'s telematics strategy},
750
Year = {2008},
751
752
Owner = {Martin Thoma},
753
Timestamp = {2015.06.29},
754
Url = {http://www.sae.org/automag/technewsletter/080506Tech/07.htm}
755
}
756
757
@Misc{AirbiquityBMW,
758
Title = {Airbiquity Signs Telematics Deal With {BMW}},
759
Month = oct,
760
Year = {2006},
761
762
Owner = {Martin Thoma},
763
Timestamp = {2015.06.29},
764
Url = {http://www.airbiquity.com/news/press-releases/airbiquity-signs-telematics-deal-bmw/}
765
}
766
767
768